Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2024 15:05

General

  • Target

    VwMeter/VwUpdate.exe

  • Size

    278KB

  • MD5

    bff83d7bd87ae8e5426035b0c67affff

  • SHA1

    f868e80eae976dbda4f6e432e317986509057a13

  • SHA256

    24c625b3e0d41ac66006e047a9caf66bd5d7e4f36b487df3f12018ec8fc6fca1

  • SHA512

    1c8239caa14e0df5a86480f17cdab0b06933b784426984478f9968420cfea6813e7d603644f598bb7f04f08bc37d9e044754132e1f2a65d9a35fe9200017fcdc

  • SSDEEP

    6144:+O6UM3aCW3e0dZfFgCZTdsmnElPV1Z4F6TQAI5d/Grernu:CUAI1dTdxGmnOPV1y6T5V

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VwMeter\VwUpdate.exe
    "C:\Users\Admin\AppData\Local\Temp\VwMeter\VwUpdate.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2184-0-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2184-1-0x0000000000320000-0x00000000003A4000-memory.dmp

    Filesize

    528KB

  • memory/2184-2-0x0000000000490000-0x00000000004DB000-memory.dmp

    Filesize

    300KB

  • memory/2184-3-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2184-5-0x0000000002D20000-0x0000000002D22000-memory.dmp

    Filesize

    8KB

  • memory/2184-4-0x0000000002D30000-0x0000000002D32000-memory.dmp

    Filesize

    8KB

  • memory/2184-6-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2184-7-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2184-8-0x0000000000490000-0x00000000004DB000-memory.dmp

    Filesize

    300KB